Security + Cryptography

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Joelcg
J
Joelcg
Community Contributor
Quizzes Created: 5 | Total Attempts: 5,427
| Attempts: 3,110 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. Which of the following is a hexadecimal value that is computed to verify authenticity?

Explanation

A checksum is a hexadecimal value that is computed to verify authenticity. The other values are not hexadecimal values computed to verify authenticity.

Submit
Please wait...
About This Quiz
Security + Cryptography - Quiz

Explore key concepts in SECURITY + CRYPTOGRAPHY with this engaging quiz. Assess your understanding of cryptographic categories, cipher types, checksums, password security, frequency analysis, and hashing. Ideal for... see morelearners aiming to enhance their security expertise. see less

2. Which of the following is a form of encryption based on the characteristics of the smallest particles known?

Explanation

Quantum cryptography is a form of encryption that is based on the characteristics of the smallest particles known. Algorithm errors occur when predictable results create a weakness in the coding system. Frequency analysis involves looking at blocks of an encrypted message to determine whether any common patterns exist. Brute-force attacks apply every possible combination of characters until a match is found.

Submit
3. Which type of cipher involves the hiding of one message within another?

Explanation

Steganography is the hiding of one message within another. There is no such valid cipher as reverseography. A transposition cipher is one in which characters are scrambled in a certain manner. A substitution cipher is a simple coding system that changes one character or symbol into another.

Submit
4. Symmetric algorithm encryption methods use either of which two ciphers? (Choose two.)

Explanation

Symmetric algorithm encryption methods use either a block cipher or a stream cipher.

Submit
5. Which of the following is the process of converting a message into a numeric value?

Explanation

Hashing is the process of converting a message into a numeric value.

Submit
6. Which type of cipher is a simple coding system that changes one character or symbol into another?

Explanation

A substitution cipher is a simple coding system that changes one character or symbol into another. There is no such valid cipher as reverseography. Steganography is the hiding of one message within another. A transposition cipher is one in which characters are scrambled in a certain manner.

Submit
7. Which of the following is derived from the message and a key and is used to verify the integrity of a message?

Explanation

Message Authentication Code (MAC) is derived from the message and a key and is used to verify integrity of a message. The other choices listed are not valid options.

Submit
8. In which PKI trust model does a root CA at the top provide all the information to intermediate CAs?

Explanation

In the hierarchical model, a root CA at the top provides all the information to intermediate CAs (and they pass it down to leaf CAs). This does not happen in the other models.

Submit
9. Which of the following is a list of which certificates are being revoked?

Explanation

The Certificate Revocation List (CRL) is a list of the certificates that are being revoked (usually because they are lost or stolen). The Certificate Practice Statement (CPS) is a statement that that CA uses to issue certificates and implement the policies of the CA. The other choices are not valid for PKI.

Submit
10. Which government agency was formerly known as the National Bureau of Standards?

Explanation

The National Institute of Standards and Technology (NIST) was formerly known as the National Bureau of Standards (NBS).

Submit
11. Which of the following involves looking at blocks of an encrypted message to determine whether any common patterns exist?

Explanation

Frequency analysis involves looking at blocks of an encrypted message to determine whether any common patterns exist. Quantum cryptography is a form of encryption that is based on the characteristics of the smallest particles known. Algorithm errors occur when predictable results create a weakness in the coding system. Brute-force attacks apply every possible combination of characters until a match is found.

Submit
12. Which is the simplest type of PKI trust model in which a peer-to-peer relationship exists between the root CAs?

Explanation

In a bridge trust model, a peer-to-peer relationship exists between the root CAs. This can also be true in the mesh and hybrid models, but they are not the simplest model in which this happens. In the hierarchical model, a root CA at the top provides all the information to intermediate CAs (and they pass it down to leaf CAs).

Submit
13. What bit hash value does MD5 produce?

Explanation

MD5 produces a 128-bit hash value.

Submit
14. Which of the following is based on the idea of using points on a curve to define the public/private key pair?

Explanation

ECC is based on the idea of using points on a curve to define the public/private key pair. Diffie-Hellman is used for the transmission of keys only. El Gamal is an asymmetric algorithm based on calculating logarithms. RSA uses large integer numbers for the basis of its process.

Submit
15. Which of the following is an update to Secure Hash Algorithm (SHA)?

Explanation

The update for SHA is the SHA-1 standard.

Submit
16. What is the most popular version of X.509?

Explanation

The most popular version of X.509 is version 3.

Submit
17. Which of the following is a 64-bit block cipher?

Explanation

Blowfish is a 64-bit block cipher. IDEA was developed by a Swiss consortium and uses a 128-bit algorithm key. CAST was developed by Carlisle Adams and Stafford Tavares and uses a 40-bit to 128-bit key. RC5 uses a key size up to 2,048 bits for symmetric encryption.

Submit
18. Which of the following is not a key component of PKI?

Explanation

The four key components of Public Key Infrastructure (PKI) are certificate authority (CA), registration authority (RA), RSA, and digital certificates.

Submit
19. Which of the following occur when predictable results create a weakness in the coding system?

Explanation

Algorithm errors occur when predictable results create a weakness in the coding system. Quantum cryptography is a form of encryption that is based on the characteristics of the smallest particles known. Frequency analysis involves looking at blocks of an encrypted message to determine whether any common patterns exist. Brute-force attacks apply every possible combination of characters until a match is found.

Submit
20. Which of the following is not one of the three main categories of cryptography?

Explanation

The three main categories of cryptography are physical, mathematical, and quantum. Steganography is a form of physical cryptography but not a category of its own.

Submit
21. If security is a real concern on your network, what length do most experts recommend as the minimum for password length?

Explanation

If security is a real concern on your network, most experts recommend 10 characters as the minimum for password length. They also recommend including as many different character sets as possible.

Submit
22. Which of the following is based on the idea of using large integer numbers for the basis of asymmetric encryption?

Explanation

RSA uses large integer numbers for the basis of its process. ECC is based on the idea of using points on a curve to define the public/private key pair. Diffie-Hellman is used for the transmission of keys only. El Gamal is an asymmetric algorithm based on calculating logarithms.

Submit
23. What is the primary difference between an RA and LRA?

Explanation

The Local Registration Authority (LRA) can be used to identify or establish the identity of an individual.

Submit
24. Which of the following was developed by a Swiss consortium and uses a 128-bit algorithm key for symmetric encryption?

Explanation

IDEA was developed by a Swiss consortium and uses a 128-bit algorithm key for symmetric encryption. CAST was developed by Carlisle Adams and Stafford Tavares and uses a 40-bit to 128-bit key. Blowfish is a 64-bit block cipher. RC5 uses a key size up to 2,048 bits.

Submit
25. Which is named after the creators and uses a 40-bit to 128-bit key for symmetric encryption?

Explanation

CAST was developed by Carlisle Adams and Stafford Tavares and uses a 40-bit to 128-bit key. IDEA was developed by a Swiss consortium and uses a 128-bit algorithm key. Blowfish is a 64-bit block cipher. RC5 uses a key size up to 2,048 bits for symmetric encryption.

Submit
26. Which of the following is not one of the three most common versions of Message Digest Algorithm (MDA)?

Explanation

The three most common versions of MDA are MD2, MD4, and MD5.

Submit
27. What bit hash value does Secure Hash Algorithm (SHA) produce?

Explanation

Secure Hash Algorithm (SHA) produces a 160-bit hash value.

Submit
28. Which of the following is not one of the main types of trust models used with PKI?

Explanation

The four main types of trust models used with PKI are hierarchical, bridge, mesh, and hybrid.

Submit
29. Which of the following is a statement that the CA uses to issue certificates and implement the policies of the CA?

Explanation

The Certificate Practice Statement (CPS) is a statement that the CA uses to issue certificates and implement the policies of the CA. The Certificate Revocation List (CRL) is a list of the certificates that are being revoked (usually because they were lost or stolen). The other choices are not valid for PKI.

Submit
30. Which of the following is an asymmetric algorithm based on calculating logarithms?

Explanation

Both Diffie-Hellman and El Gamal are asymmetric algorithms based on calculating logarithms. Here's a brief explanation of each:

Diffie-Hellman: This algorithm is a method for securely exchanging cryptographic keys over a public channel, allowing two parties to establish a shared secret key. It is based on the difficulty of calculating discrete logarithms.

El Gamal: This algorithm is used for public key encryption and digital signatures. It is based on the difficulty of solving the discrete logarithm problem and is an extension of the Diffie-Hellman key exchange.

RSA, while also an asymmetric algorithm, relies on the difficulty of factoring large prime numbers, not logarithms. ECC (Elliptic Curve Cryptography) is another asymmetric algorithm that is based on the algebraic structure of elliptic curves over finite fields.

Submit
View My Results

Quiz Review Timeline (Updated): Apr 9, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 09, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 31, 2010
    Quiz Created by
    Joelcg
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is a hexadecimal value that is computed to...
Which of the following is a form of encryption based on the...
Which type of cipher involves the hiding of one message within...
Symmetric algorithm encryption methods use either of which two...
Which of the following is the process of converting a message into a...
Which type of cipher is a simple coding system that changes one...
Which of the following is derived from the message and a key and is...
In which PKI trust model does a root CA at the top provide all the...
Which of the following is a list of which certificates are being...
Which government agency was formerly known as the National Bureau of...
Which of the following involves looking at blocks of an encrypted...
Which is the simplest type of PKI trust model in which a peer-to-peer...
What bit hash value does MD5 produce?
Which of the following is based on the idea of using points on a curve...
Which of the following is an update to Secure Hash Algorithm (SHA)?
What is the most popular version of X.509?
Which of the following is a 64-bit block cipher?
Which of the following is not a key component of PKI?
Which of the following occur when predictable results create a...
Which of the following is not one of the three main categories of...
If security is a real concern on your network, what length do most...
Which of the following is based on the idea of using large integer...
What is the primary difference between an RA and LRA?
Which of the following was developed by a Swiss consortium and uses a...
Which is named after the creators and uses a 40-bit to 128-bit key for...
Which of the following is not one of the three most common versions of...
What bit hash value does Secure Hash Algorithm (SHA) produce?
Which of the following is not one of the main types of trust models...
Which of the following is a statement that the CA uses to issue...
Which of the following is an asymmetric algorithm based on calculating...
Alert!

Advertisement